Social media safety tips for parents of tweens & teens Ginger Kadlec: BeAKidsHero

Size: px
Start display at page:

Download "Social media safety tips for parents of tweens & teens Ginger Kadlec: BeAKidsHero"

Transcription

1 Social media safety tips for parents of tweens & teens Ginger Kadlec: BeAKidsHero

2 Online threats are REAL. An astonishing 95% of tweens and teens are online (Source: Pew Research). iphones, ipads and other mobile devices have become "vital" appendages to most teens... those devices are their social lifeline with other teens, as well as their instant connection to the rest of the world. While there are many advantages and fun-aspects of social media, there are also some very real dangers. Teens need help navigating those potential dangers and it s up to parents to play a key role in maintaining teens online safety. Pulling back the covers, we see some very scary statistics: More than 104 million child pornography images have been reviewed by the National Center for Missing and Exploited Children since This is number is increasing at an alarming rate due in large part to the Internet. In fact, the number of new images reviewed in 2013 was an astonishing 24 million, an increase of 30% in just one year. In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes. (Source: Journal of Adolescent Health, 2010) 65% of online sex offenders used the victim's social networking site to gain home and/or school information about the victim. (Source: Journal of Adolescent Health, 2010) 70% of kids ages 8 to 18 report unintentionally stumbling across pornographic images while online. The average age for a child to be exposed to online pornography is just 11 years old (Source: Enough Is Enough) Online threats are very real and can range from mildly age-inappropriate content to cyberbullying to sexual exploitation, assault or even death. So what can you as a parent do to help protect your teen from the very real dangers lurking on the Internet? For starters, know what apps your teen is downloading. Following is a quick rundown of 12 Scary Apps to put at the top of your watch list. *WARNING: Before you continue, please note some of the content in this report is graphic and intended for adults. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 2

3 Ask.fm Ask.fm enables users to anonymously follow your teen and publically ask any question and I mean ANY question. The questions posted on this app cover the gamut! After reading all sorts of things about Ask.fm, I decided to download it myself... and was shocked. Within minutes of using the app, the 2nd question posed to me by an anonymous user was, "What is your bra size?" The image on the right is a screen shot of the stream feed. Please note the nature of the question that randomly appeared in my feed this is an example of what ANY Ask.fm user (i.e., your kids) could see in the stream. Ask.fm Questions screen shot. Ask.fm does offer some privacy settings, including the ability to hide posts from the stream and blacklist users. This app is highly integrated with Facebook and Twitter, so questions/responses to your teen s account can be set-up to automatically post to those apps, increasing the viral nature of the content generated on Ask.fm. YourSphere.com actually calls Ask.fm "a toxic site. Numerous cases of cyberbullying, some leading to suicide, can be tracked back to this app. Ask.fm Stream screen shot. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 3

4 Qooh.me Similar to Ask.fm., Qooh.me allows users to post anonymous questions it has been reported that the anonymous questions posed are often mean spirited or totally inappropriate, even though the Qooh.me 'terms and conditions' state, "You may not use Qooh.me to abuse, bully, harass, threaten, malign, slander, impersonate or intimidate anyone." There are no age requirements or parental controls. Under its Cool Tips, Qooh.me allows users to tag others, totally anonymously. In fact, it states, The person you TAG won t see that (you re) tagging them. This gives you privacy. As with Ask.fm, questions are anonymous and Qooh.me specifies that the questions are untraceable. Oh, the cyberbullying dangers lurking in this app are endless 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 4

5 Creepy This name certainly fits the app! Creepy extracts geolocation data from other apps your teen is using (such as FourSqaure, Twitter or Flickr) and combines that with all public information about your teen that is available online. It then takes that data and actually plots on a map the physical whereabouts of your teen. Creepy can also provide a history of the places your teen has been based on the history of tweets and other social media posts. As you can imagine, this app can and has been used for predatory purposes, including stalking. Creepy screen shot (Source: softonic.com) Snapchat Widely known as "the sexting app, kids often think photos they share using Snapchat show from 1 to 10 seconds then immediately disappear... not true. Screenshots can be saved then distributed to others or photos can be sent to multiple recipients. The cute little Snapchat ghost logo is looks innocent enough, but please be aware of how this app can be misused. Snapchat icon (Source: Google Play) 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 5

6 Kik Kik user guidelines specify this app is intended for people aged 17 and older... but tweens and teens are actively using it. In fact, Kik is another commonly used sexting app. Teens often promote their Kik names on Instagram, posting "Kik me at <insert their Kik user ID>". BeWebSmart.com conducted research on this app and found some alarming, pretty standard activity (see example screen shot on right). Much of the content is adult in nature and really is not intended for younger audiences. Kik logo (Source: Technology Guide) BeWebSmart.com reminds parents, "Remember, you don t need a phone to use iphone apps; if your child has an ipod touch or an ipad, they can install iphone apps. Kik is just one of many free texting apps available in the App store." Kik screenshot (Source: BeWebSmart.com) 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 6

7 Vine This 6-second video production app is used by many for legitimate purposes, but it also has a dark side. When it was initially launched, Vine was heavily used to distribute pornography. Vine attempted to remove as much porn as they could, but users found a way to get around that by simply changing the hashtags they were using. Terms of service have not changed since 2013, so sexual content and nudity are still permitted on Vine. Pheed One of the fastest growing apps around, Pheed has been touted by Forbes as 'the new Twitter' and Huffington Post as 'the next generation of social media.' With 81% of its user base aged 14 to 25, Pheed is incredibly popular among teens. Its design resembles a Facebook page and its functionality is like Instagram on steroids. Pheed offers live stream broadcast capability and, unlike Vine, doesn't set a time limit for video or audio streaming. Pheed offers parental controls to restrict the channels that can be viewed (users rate their own channels). The good news is Pheed guidelines really do attempt to make it a safer site. Because of its growing popularity, this is a good one for parents to monitor, though. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 7

8 Whisper Known as a secrets app, Whisper allows users to anonymously post secrets they want to share by creating an online poster complete with a graphic underlay and the user s secret in text on top of the image. According to The Atlantic in August 2013, Whisper was getting 2.5 billion page views per month, way more than even a media powerhouse like CNN. Users can remain anonymous and reply either publically or privately to other whispers. Visit the Whisper homepage to get a feel for the type of content on this app much of it is adult in nature. The danger in this app lies in teens engaging in private conversations and sharing personal information with potential predators. It is also has the potential to be a cyberbullying breeding ground. Post Secret Another secrets sharing app, Post Secret allows users to post anonymous secrets on one side of a homemade post card. This app began as a community mail art project and has grown into a hugely popular social media site. According to Youth Trends' February 2008 "Top Ten List Report", Post Secret was the 10th most popular site among female students in the USA (Source: Wikipedia). While some content is benign, much of it is intended for an adult audience (example: see postcard on right). Image source: Whisper.com Image source: PostSecret.com 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 8

9 Girls Around Me Sometimes referred to as a stalking app, the super creepy Girls Around Me app uses geolocation technology that connects to other apps (such as Four Square or Facebook) to identify the location of females (or males gender selection is user-specified) in the user s immediate physical area. Tying this back to one of the scary statistics about Internet predators, over 25% of online sexual offenders used their victims social media sites to identify the physical location of those victims. Girls Around Me just makes it that much easier. Pretty scary stuff. Grindr Image source: Cult of Mac Another geolocation app is Grindr. Geared towards gay, bisexual and bi-curious men, this networking app s geolocation capabilities allows users to locate other men that are in close proximity. It shows a grid with photos of users that are in the same geographic area, as well as profiles and the options to chat, share pictures or provide more detail geographic information. Minimum age for use is 18, but youth are fudging their ages and using this app, as well. Image source: Wikipedia 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 9

10 Tinder Using information from Facebook profiles, Tinder is yet another geolocation networking app that connects people in close proximity. The danger in these types of apps is that they are used by sexual predators to troll for children, both girls and boys. Image source: Wikipedia Tinder has a minimum age for use of 13-years old. As an added safety precaution, Tinder only allows users to interact with other users in their same age group for youth, that age group is 13 to 17 years old. Tinder relies on data from Facebook to assign users to age groups. The potential danger in this lies in the fact that adult sexual predators can, and in fact do, establish alias Facebook accounts purporting to be minors. of other scary apps? Please share them with me at ginger@gingerkadlec.com. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 10

11 What can parents do? Parents can limit the types of apps their teens download to digital devices via parental control functions on iphone or ipads. Various apps are assigned ratings (source: itunes): 4+ Applications in this category contain no objectionable material. 9+ Applications in this category may contain mild or infrequent occurrences of cartoon, fantasy or realistic violence, and infrequent or mild mature, suggestive, or horror-themed content which may not be suitable for children under the age of Applications in this category may also contain infrequent mild language, frequent or intense cartoon, fantasy or realistic violence, and mild or infrequent mature or suggestive themes, and simulated gambling which may not be suitable for children under the age of You must be at least 17 years old to purchase this application. Applications in this category may also contain frequent and intense offensive language; frequent and intense cartoon, fantasy or realistic violence; and frequent and intense mature, horror, and suggestive themes; plus sexual content, nudity, alcohol, tobacco, and drugs which may not be suitable for children under the age of 17. Image source: BeWebSmart.com BeWebSmart.com offers a simple step-by-step guide to restrict application downloads by rating. These steps should work for Apple products including iphones and ipads. For parental controls on other types of digital devices, please refer to the manufacturers' websites for details and instructions. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 11

12 Parents: be app wise! It may seem daunting, but your teens need YOU to help be sure the apps they use, whether on their own mobile devices or on a friend s computer, are being used in a safe manner. To help keep your teens safe, try these tips: 1. Limit the number of apps they can use. Have your teen select two or three apps they most wish to use. Then, you trust by verify by checking their iphone, computer or other mobile devices to be sure they are abiding by that limitation. 2. Sign a social media contract with your teen. I love this idea! Social media contracts help outline the do s and don ts for both you and your teen. Plus, the act of signing a contract really does add a level of accountability to your teen for their responsible use of technology. You can search the Internet for some good samples of social media contracts to customize and make your own. One resource is Common Sense Media it offers some age-appropriate contracts for kids K-12 check em out at 3. Computers and cell phones belong to YOU, the parent. Did you pay for that piece of technology? Are you paying the monthly service fees? Who is legally responsible for the actions of your child? If you answered yes to even one of these questions, the ultimate decision making power about which apps to use or not to use belongs with YOU, the parent or guardian. It is a privilege, not a right, for your teen to use technology and social media. If your teen abuses the privilege, then the privilege should be revoked and consequently used as a teaching moment to help your teen not make a similar mistake in the future. I offer this information to you as a place to start. Engage. Talk with your teens about Internet and social media safety. If you aren t familiar with an app you find on your teen s iphone or ipad, Google it! Learn as much as you can about the pitfalls and potential dangers of apps your teens are using and discuss with them ways to use those apps safely. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 12

13 For More Information You may also find these online resources helpful: Please don t hesitate to contact me on my website at or ginger@beakidshero.com. I will do my best to find answers for you. Thank You! Special thanks to Hamilton County Sheriff s Department Detective Alex Petty for his input and guidance on the list of apps in this report. Thanks, too, to the various news and social media outlets from whom information was shared as part of this report, including: Pew Research National Center for Missing and Exploited Children Journal of Adolescent Health Enough Is Enough Yoursphere Be Web Smart Softonic Forbes Huffington Post The Atlantic Google Play Technology Guide Cult of Mac Wikipedia itunes Disclaimer: Material presented in this document and on gingerkadlec.com is intended for information purposes only. It is not intended as professional advice and should not be construed as such. Ginger Kadlec: BeAKidsHero does not necessarily sponsor, endorse or otherwise approve of the materials appearing in sites referenced in this report. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 13

15 Dangerous Apps Every Parent Should Know About

15 Dangerous Apps Every Parent Should Know About 15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges

More information

A Parents Guide to. 2014 ConnectSafely.org

A Parents Guide to. 2014 ConnectSafely.org A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

A Parents' Guide to. 2014 ConnectSafely.org

A Parents' Guide to. 2014 ConnectSafely.org A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram

More information

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the

More information

How To Avoid The Identity Theft Predators

How To Avoid The Identity Theft Predators Camp Watwuzithinkin How To Avoid The Identity Theft Predators Predator 0 An organism that lives by preying on other organisms Identity Thief 0 A person who makes a living by preying on other people Outsmart

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the

More information

Kingsley Park Primary School. 1-1 ipad Program BYOD

Kingsley Park Primary School. 1-1 ipad Program BYOD Kingsley Park Primary School 1-1 ipad Program BYOD 2016 Kingsley Park Primary School ipad 1-1 BYOD Program In 2015 KPPS implemented a 1-1 BYOD [bring your own device] Program for Grades 4-6. We will be

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

PARENT UNIVERSITY OFFICER JOE BOYD OFFICER RACHAEL FREEMAN

PARENT UNIVERSITY OFFICER JOE BOYD OFFICER RACHAEL FREEMAN PARENT UNIVERSITY OFFICER JOE BOYD OFFICER RACHAEL FREEMAN SRO DIVISION Sgt. Eric Debus Officers Chris Cobb and Diane Patterson (CHS) Officer RJ Harr (New Tech) Officer Joe Boyd (CMSW, Pinkerton, Wilson,

More information

Social Networking Sites A Predator s Playground?

Social Networking Sites A Predator s Playground? Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every

More information

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

Living Online: Using Technology Wisely Lesson. Guide

Living Online: Using Technology Wisely Lesson. Guide Living Online: Using Technology Wisely Lesson Guide Target Audience Adolescents 11-14 Time Entire program 1 hour, depending on discussion Program Objectives Ways to portray a positive image online How

More information

Grand Canyon Council - Social Media Policy

Grand Canyon Council - Social Media Policy INTRODUCTION It s an exciting time to be part of the BSA for many reasons. One of those is that new communication vehicles now enable current and past Scouts and Scouters, as well those who are interested

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2 Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Internet Safety Guidelines

Internet Safety Guidelines Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can

More information

SOCIAL MEDIA & DIGITAL MARKETING POLICIES AND PROCEDURES

SOCIAL MEDIA & DIGITAL MARKETING POLICIES AND PROCEDURES SOCIAL MEDIA & DIGITAL MARKETING POLICIES AND PROCEDURES The purpose of the Social Media and Digital Marketing Policy is to ensure the proper use of county social sites, web based marketing and technologies

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

E-Safety Awareness. Parents and Carers

E-Safety Awareness. Parents and Carers E-Safety Awareness Parents and Carers Bullying online by people in my school year has left me with significant mental health issues for which I am now on medication and in therapy for. So it s really damaged

More information

Bullying 101: Guide for Middle and High School Students

Bullying 101: Guide for Middle and High School Students Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org

More information

Online Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk

Online Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk Online Reputation Luke www.ceop.police.uk www.thinkuknow.co.uk Child Exploitation Online Protection Centre (CEOP) Never give out your personal information Parents 1 When should I report to CEOP? How to

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Online Safety How to Protect Yourself and Your Family

Online Safety How to Protect Yourself and Your Family Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing

More information

www.xxxchurch.com Online Predators & Strangers

www.xxxchurch.com Online Predators & Strangers www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

University Schools Social Media Guidelines for Employees

University Schools Social Media Guidelines for Employees University Schools Social Media Guidelines for Employees Purpose of Social Media Guidelines All University Schools Laboratory Employees are subject to the Ball State University Social Media Policy available

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

!! What dangers do your!children!face when they go online?!! All!who!participate!in!activities!online!face!risks!when!they!use!the!

!! What dangers do your!children!face when they go online?!! All!who!participate!in!activities!online!face!risks!when!they!use!the! What dangers do yourchildrenface when they go online? Allwhoparticipateinactivitiesonlinefaceriskswhentheyusethe Internet,includingadults.Theworldisconstantlychangingwithnew technologyavailabledaily.itmayfeeloverwhelmingwhenwefocuson

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

A Time to Tell Troop Meeting Guide

A Time to Tell Troop Meeting Guide A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as

More information

The Social Media Guide For Small Businesses

The Social Media Guide For Small Businesses The Social Media Guide For Small Businesses Authored By: Justin Rissmiller, Owner & Operator A Publication Of: T&R Solutions: Define. Design. Progress. YOUR LOGO Contents An Introduction To Social Media

More information

2014 Teen Internet Safety Survey. Conducted by The Futures Company

2014 Teen Internet Safety Survey. Conducted by The Futures Company 2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online

More information

WHAT YOUR TEEN IS DOING ON SOCIAL MEDIA

WHAT YOUR TEEN IS DOING ON SOCIAL MEDIA WHAT YOUR TEEN IS DOING ON SOCIAL MEDIA THE GUIDE 2014 EDITION It s undeniable that Social Media has changed the way teenagers experience the world. Your teens are on social media as soon as they get up,

More information

Office of Communications Social Media Handbook

Office of Communications Social Media Handbook Office of Communications Social Media Handbook Table of Contents Getting Started... 3 Before Creating an Account... 3 Creating Your Account... 3 Maintaining Your Account... 3 What Not to Post... 3 Best

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Phone Apps for Online Safety Apple and Android

Phone Apps for Online Safety Apple and Android Phone Apps for Online Safety Apple and Android Safe Eyes Mobile (Mobile App) Control your child's Internet usage while she's on the iphone by blocking questionable sites. This app has YouTube filtering

More information

6 BEST SOCIAL SELLING TECHNIQUES TO HELP YOU MOVE THE CONVERSATION NEEDLE

6 BEST SOCIAL SELLING TECHNIQUES TO HELP YOU MOVE THE CONVERSATION NEEDLE 6 BEST SOCIAL SELLING TECHNIQUES TO HELP YOU MOVE THE CONVERSATION NEEDLE Sponsored by: Follow us on: JACK KOSAKOWSKI Jack Kosakowski covers Buffer, Crowdfire App and Hootsuite. Here is his LinkedIn profile

More information

The webcast will begin shortly. Please stand by.

The webcast will begin shortly. Please stand by. The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone

More information

Who's chatting to your kids?

Who's chatting to your kids? N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

ONLINE PREDATORS & PREDATORS

ONLINE PREDATORS & PREDATORS the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.

More information

RISKS OF ELECTRONIC COMMUNICATION 2

RISKS OF ELECTRONIC COMMUNICATION 2 Palacký University Olomouc FACULTY OF EDUCATION Centre for the Prevention of risky virtual communication Czech Republic RISKS OF ELECTRONIC COMMUNICATION 2 SURVEY RESEARCH REPORT CONDUCTED WITHIN A PROJECT

More information

Girls & Cyber- bullying

Girls & Cyber- bullying MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts

More information

Parenting & Technology: The Internet, Texting & Social Networks

Parenting & Technology: The Internet, Texting & Social Networks Parenting & Technology: The Internet, Texting & Social Networks Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety online Instant messaging,

More information

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and

More information

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life. Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for

More information

Social Media Strategy

Social Media Strategy Social Media Strategy Tonbridge School Social Media Strategy We believe social media is important to the school and its communications. Tonbridge School should share messages about academic excellence,

More information

Common Facebook issues

Common Facebook issues Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young

More information

Nower Hill High School

Nower Hill High School Nower Hill High School An introduction to E-Safety Louise Voden, Ben Ford & PC Ian Scanlon Outcomes: Highlight the potential risks young people may face online Describe the technologies and functions Outline

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Teen Online & Wireless Safety Survey

Teen Online & Wireless Safety Survey Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message

More information

UNSUPERVISED AND ONLINE

UNSUPERVISED AND ONLINE UNSUPERVISED AND ONLINE Effective Identification of Negative Online Behavior and Strategies for Creating a Family Prevention Plan Follow us on: Contact us at: notmykid.org info@notmykid.org 602.652.0163

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

Using apps safely and securely on your mobile

Using apps safely and securely on your mobile Using apps safely and securely on your mobile In association with: Apps are becoming an increasingly important way to communicate and access the internet through our phones, tablets and TVs. We use them

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

Tizen Validation Guidelines

Tizen Validation Guidelines Tizen Validation Guidelines Tizen Validation Guide Index 1. Introduction... 3 2. Application Validation Process... 4 2.1 Initial Inspection & Dynamic Analysis... 4 2.2 Content Review & Final Confirmation...

More information

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used? TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to

More information

Predators will use information obtained from children to gain trust and friendship

Predators will use information obtained from children to gain trust and friendship 1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and

More information

Eastern University Social Media Policy & Guidelines for Use

Eastern University Social Media Policy & Guidelines for Use Eastern University Social Media Policy & Guidelines for Use Office of University Relations August 2015 Table of Contents Eastern University and Social Media Personal Social Media Use How to Get Started

More information

Things to remember when using social media

Things to remember when using social media Things to remember when using social media July 2014 email hello@commonagency.com phone 01484 437454 Yorkshire studio The Media Centre 7 Northumberland St. Huddersfield West Yorkshire HD1 1RL London office

More information

TRANSCRIPT. Fred.: The basic definition of a cyber-trap is a real world legal issue that kids can get into through the use of electronics.

TRANSCRIPT. Fred.: The basic definition of a cyber-trap is a real world legal issue that kids can get into through the use of electronics. Across the Fence University of Vermont Extension 106 High Point Center, Suite 300 Colchester, Vermont 05446-8800 802-656-5059 or 888-283-3430 www.uvm.edu/extension/atfblog/ TRANSCRIPT EPISODE DATE: 7/18/12

More information

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766 FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY www.cheezo.org 303-271-6766 A Message from District Attorney Peter Weir One of the priorities of the District Attorney s Office

More information

Deborah Werner. Deborah Werner Project Director SAMHSA s TA and Training on Women and Families Impacted by Substance Abuse and Mental Health Problems

Deborah Werner. Deborah Werner Project Director SAMHSA s TA and Training on Women and Families Impacted by Substance Abuse and Mental Health Problems Welcome Deborah Werner Deborah Werner Project Director SAMHSA s TA and Training on Women and Families Impacted by Substance Abuse and Mental Health Problems Technical Information Your lines will be muted

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

The Digital Life of Teens

The Digital Life of Teens The Digital Life of Teens Trends, Concerns, and Impacts Yoon Hyung Choi Amanda Purington Main Themes Digital Media Usage and Access How do teens and tweens access digital media? What do they do online?

More information

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW

Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW Most parents report having a safety conversations with their children regarding online safety

More information

IMPACT OF SOCIAL NETWORKING SITES (SNS) ON THE YOUTH

IMPACT OF SOCIAL NETWORKING SITES (SNS) ON THE YOUTH IMPACT OF SOCIAL NETWORKING SITES (SNS) ON THE YOUTH Ms. Shabnam S. Mahat Assistant Professor Department of Computer Applications Bharati Vidyapeeth Deemed University, IMRDA, Sangli. Dr. S. D. Mundhe Director,

More information